Hybrid broadcast encryption method
a broadcast encryption and hybrid technology, applied in the field of hybrid broadcast encryption, can solve the problems of increasing the number of keys to be managed accordingly, affecting the transmission speed, and reducing the overhead of transmission and calculation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0061]First, definitions are provided for coefficients for a hybrid broadcast encryption method according to an exemplary embodiment of the present invention.[0062]U: Set of users with |U|=n[0063]P: Set of privileged users with |U−P|=r[0064]R: Set of revoked users, i.e. U−R=P[0065]d, C: some integer such that binomial(C,d)>2n[0066]L: number of partitions of U[0067]M: number of trees in each partition (ex: LM is the number of all trees)[0068]Ni(i=1, . . . , L): RSA modulus with m bits[0069]ω(1,i), ω(2,i)(i=1, . . . , L): random number with m bits[0070]G(i), (i=1, . . . ,L): L-partition of U[0071]x(i), (i=1, . . . , L): secret of G(i), (m bits)[0072]T(i,j): jth Tree of G(i) which of each has n / LM elements G(i) as leasves[0073]y(i,j), (i=1, . . . , L, j=1, . . . , M): secret of T(i,j), (m bits)[0074]y(i)=Πj=1, . . . , My(i,j)mod φ(N), (i=1, . . . , L) (m bits)[0075]v(i,j,k): kth node of T(i,j)[0076]p(i,j,k): small prime of v(i,j,k), which has size length(p)[0077]σ(i,j,k): permutation o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


